Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:5628: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-1095: A NULL pointer dereference flaw was found in the Linux kernel’s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.
  • CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU.
  • CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat.
  • CVE-2023-3776: A use-after-free vulnerability was found in fw_set_parms in net/sched/cls_fw.c in network scheduler sub-component in the Linux Kernel. This issue occurs due to a missing sanity check during cleanup at the time of failure, leading to a misleading reference. This may allow a local attacker to gain local privilege escalation.
  • CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
Red Hat Security Data
#vulnerability#linux#red_hat#dos#auth#rpm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
  • kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
  • kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)
  • kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head (CVE-2023-1095)
  • kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • avoid unnecessary page fault retires on shared memory types (BZ#2221102)
  • [Hyper-V][RHEL-8] Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2227261)
  • kernel-devel RPM cross-compiled by CKI contains host-arch scripts (BZ#2232139)
  • iavf: hang in iavf_remove() - SNO node hangs after running systemctl reboot (BZ#2232405)
  • netfilter: RHEL 8.8 phase 2 backports from upstream (BZ#2236818)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2173973 - CVE-2023-1095 kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
  • BZ - 2181891 - CVE-2023-1637 kernel: save/restore speculative MSRs during S3 suspend/resume
  • BZ - 2225097 - CVE-2023-3776 kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
  • BZ - 2225201 - CVE-2023-3609 kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
  • BZ - 2225511 - CVE-2023-4128 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route

CVEs

  • CVE-2023-1095
  • CVE-2023-1637
  • CVE-2023-3609
  • CVE-2023-3776
  • CVE-2023-4128

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.108.1.el8_4.src.rpm

SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8

x86_64

bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a

bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda

kernel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d

kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6

kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732

kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719

kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747

kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80

kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17

kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d

kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155

kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e

kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f

kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65

kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7

kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f

kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca

kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9

kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2

kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef

kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0

kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4

perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006

perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e

python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0

python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.108.1.el8_4.src.rpm

SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8

x86_64

bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a

bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda

kernel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d

kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6

kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732

kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719

kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747

kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80

kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17

kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d

kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155

kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e

kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f

kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65

kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7

kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f

kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca

kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9

kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2

kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef

kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0

kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4

perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006

perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e

python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0

python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.108.1.el8_4.src.rpm

SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8

ppc64le

bpftool-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 7a29d84e95b7955aba6d5b327a03198e746166728f4af7b8f5baa640fd225cb9

bpftool-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: cf8b7e66debd770c0bc9f4183a9744d7282f2ece916b6875d2683b4fc680c309

kernel-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 9b4114998c326d00084d7b5f06483110b4859bdea52d1ab3eb462c1a1c2f23dc

kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6

kernel-core-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 1d6fa6fe386af2269a164b339449d5da8d99ac684dbf5b412655da50a1626b9e

kernel-cross-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: a242541cf1e01fc397a74eb5f9dad1991fcf4ee1e112166ad27ec16a06fff45f

kernel-debug-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: a909fc5a7b355d674703ddb0b57773561792bc1a5b82b4ded0a253ceca4aafb0

kernel-debug-core-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 88c7300d858038da57c532670ec919adda3e2f2469bcf290a6ea606ae87d2d5e

kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 1213ea9c35351a430a27a7fd347f5f2a844858fe81dbe77d939d76b7f8de49ab

kernel-debug-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 8530afc084e36545c8f536317055e8d5d801dbda7a7ae79e2cacb380874b0caa

kernel-debug-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 2d5d636e829578f392e8589a3ab7ffe6b974e08c4ed136c70055ad483827b814

kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 90a5b6537d34d442da4f4f79920cfa1cdf9483ad3ae051207399d325f66481f5

kernel-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 7d1ca28dd9da6750953081e9b094162be516f988c5307a18e34c685c43c42c2f

kernel-debuginfo-common-ppc64le-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 28d064ac655b19d766d3e80de7851e2b49a8e30266878e27973518e3b83eb6ae

kernel-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 8c923e00a3f7ff39906faeb1610031215bdd0e2aaf752aa4da757601ff1e856e

kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f

kernel-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: f91e7d88bf67d765679cf9a4dbc51775a42d8397fcd540ae1c01dffa95c0c3d3

kernel-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: d7bd87aea1f21ad299672ead01c409a54a36376c02476531e05488971dc7551e

kernel-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: a59b1f6cf19e694e47746ec627ad892209c83a5f26d8d4e88aebd4869139e36f

kernel-tools-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 89372a24aadc4ad68e353e29129b9f335b35182c80204c3326a8dac3cd78bdcd

kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 8e31a250dd291000919ee47c30e3ced3ac17734dd22d6e91ca1feb391af79fb6

kernel-tools-libs-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: ac4e20051f8d3af8a240f0aa2b61a4a4ed17bdf10582a4e4235b00379beea407

perf-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 6dafe89e4417480caafa4d265f011e655d1ab801a761350a685e7e7bfd6997eb

perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: 28a25ad81122647c5bfec9cb0e99fae15b29e1404451f80c3da0b23a2b8272e7

python3-perf-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: b112fe78c30c255e499cbd2a39a7b18558334233676ecd5441390af3652893cd

python3-perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm

SHA-256: a6bae502c020dff3e907d923ac922ff949d2291d2c1f42492d7bda65932ab4e4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.108.1.el8_4.src.rpm

SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8

x86_64

bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a

bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda

kernel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d

kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6

kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732

kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719

kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747

kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80

kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17

kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d

kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155

kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e

kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f

kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65

kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7

kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm

SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f

kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca

kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9

kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2

kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef

kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0

kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4

perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006

perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e

python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0

python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm

SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Related news

Red Hat Security Advisory 2024-1253-03

Red Hat Security Advisory 2024-1253-03 - An update for kpatch-patch-5_14_0-70_64_1, kpatch-patch-5_14_0-70_70_1, kpatch-patch-5_14_0-70_75_1, kpatch-patch-5_14_0-70_80_1, and kpatch-patch-5_14_0-70_85_1 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2024-0261-03

Red Hat Security Advisory 2024-0261-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7539-01

Red Hat Security Advisory 2023-7539-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7434-01

Red Hat Security Advisory 2023-7434-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7419-01

Red Hat Security Advisory 2023-7419-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7418-01

Red Hat Security Advisory 2023-7418-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7077-01

Red Hat Security Advisory 2023-7077-01 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include buffer overflow, denial of service, double free, information leakage, memory leak, null pointer, out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5794-01

Red Hat Security Advisory 2023-5794-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

Kernel Live Patch Security Notice LSN-0098-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Various other issues were also addressed.

Red Hat Security Advisory 2023-5628-01

Red Hat Security Advisory 2023-5628-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5627-01

Red Hat Security Advisory 2023-5627-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, null pointer, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5603-01

Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5589-01

Red Hat Security Advisory 2023-5589-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.

RHSA-2023:5621: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subs...

RHSA-2023:5589: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_co...

RHSA-2023:5575: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. * CVE-2023-31248: A use-af...

Ubuntu Security Notice USN-6386-3

Ubuntu Security Notice 6386-3 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6387-2

Ubuntu Security Notice 6387-2 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6397-1

Ubuntu Security Notice 6397-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6386-1

Ubuntu Security Notice 6386-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6387-1

Ubuntu Security Notice 6387-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-5233-01

Red Hat Security Advisory 2023-5233-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.4 images.

Red Hat Security Advisory 2023-5235-01

Red Hat Security Advisory 2023-5235-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5238-01

Red Hat Security Advisory 2023-5238-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-6383-1

Ubuntu Security Notice 6383-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the ARM64 KVM implementation in the Linux kernel did not properly restrict hypervisor memory access. An attacker in a guest VM could use this to execute arbitrary code in the host OS.

Red Hat Security Advisory 2023-5255-01

Red Hat Security Advisory 2023-5255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine- tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5221-01

Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

RHSA-2023:5235: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate t...

RHSA-2023:5238: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their p...

RHSA-2023:5233: Red Hat Security Advisory: OpenShift Virtualization 4.13.4 security and bug fix update

Red Hat OpenShift Virtualization release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.

Red Hat Security Advisory 2023-5069-01

Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5069-01

Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

RHSA-2023:5093: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system. * CVE...

RHSA-2023:5091: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU. * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can...

Ubuntu Security Notice USN-6342-1

Ubuntu Security Notice 6342-1 - Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6341-1

Ubuntu Security Notice 6341-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a use-after-free vulnerability existed in the IEEE 1394 implementation in the Linux kernel. A privileged attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6332-1

Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6331-1

Ubuntu Security Notice 6331-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6329-1

Ubuntu Security Notice 6329-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6328-1

Ubuntu Security Notice 6328-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6327-1

Ubuntu Security Notice 6327-1 - Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6325-1

Ubuntu Security Notice 6325-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6317-1

Ubuntu Security Notice 6317-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6318-1

Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6318-1

Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6315-1

Ubuntu Security Notice 6315-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6309-1

Ubuntu Security Notice 6309-1 - Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service.

CVE-2023-4128: Invalid Bug ID

A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.

CVE-2023-3776

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVE-2023-3609

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Ubuntu Security Notice USN-6031-1

Ubuntu Security Notice 6031-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Integrity Measurement Architecture implementation in the Linux kernel did not properly enforce policy in certain conditions. A privileged attacker could use this to bypass Kernel lockdown restrictions.

Ubuntu Security Notice USN-6014-1

Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-6013-1

Ubuntu Security Notice 6013-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-6001-1

Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

CVE-2023-1095: netfilter: nf_tables: fix null deref due to zeroed list head · torvalds/linux@5800778

In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.